Access Millions of academic & study documents

Security Final

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/6
Running head: SECURITY MANAGEMENT MODELS
1
Security Management Models
IS311 Security Operations
Instructor:
Institution:
October 10th, 2017

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
SECURITY MANAGEMENT MODELS 2
Information security performance management revolves around the process of designing,
managing an implementing the use of collected data that are used in the determination of the
overall security of a program. Performance measurements, on the other hand, are data points that
relate to computed trends that help indicate the effectiveness of the security. The process of
blueprints security network together with frameworks all are useful in designing and developing
InfoSec model. These are the methods that are used in implementing and determining how and
what is to be controlled. The blueprints and outline are then subsequently developed into
procedures and practices for a policy. Through access control, the program is able to regulate the
ones who can view the programs. These access controls are available in two types, the logical
and physical types. The physical type limits the access to certain areas while the logical types are
responsible for the local correlation within the files, network, and data.
The key term, in this case, includes the need to know, separation of duties and least privilege:
Need to know is responsible for limiting the user privileges, that to be able to view only
the information that is required for performing the particular duties at hand.
Separation of duties, on the other hand, requires that various tasks be split up so that more
than one skilled individual can be able to complete them.
Least privilege ensures that no unnecessary access to data exists, it does this by
controlling the amount of data that can be accessed by each employee (Mattord, 2017).
Various techniques are used to categorize the access control practices as listed below:
Recovery reestablishes operating systems
Detective can identify the threat
Preventative evaded prevalence
Directive is an administrative control

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Running head: SECURITY MANAGEMENT MODELS 1 Security Management Models IS311 Security Operations Instructor: Institution: October 10th, 2017 SECURITY MANAGEMENT MODELS 2 Information security performance management revolves around the process of designing, managing an implementing the use of collected data that are used in the determination of the overall security of a program. Performance measurements, on the other hand, are data points that relate to computed trends that help indicate the effectiveness of the security. The process of blueprints security network together with frameworks all are useful in designing and developing InfoSec model. These are the methods that are used in implementing and determining how and what is to be controlled. The blueprints and outline are then subsequently developed into procedures and practices for a policy. Through access control, the program is able to regulate the ones who can view the programs. These access controls are available in two types, the logical and physical types. The physical type limits the access to certain areas while the logical types are responsible for the local correlation within the files, network, and data. The key term, in this case, includes the need to know, separation of duties and least privilege: • Need to know is responsible for limiting the user privileges, that to be able to view only the information that is required for performing the particular duties at hand. • Separation of duties, on the o ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4